Sciweavers

1975 search results - page 100 / 395
» Implicit Human Computer Interaction Through Context
Sort
View
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 9 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
132
Voted
CHI
2005
ACM
16 years 3 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
120
Voted
PG
1997
IEEE
15 years 7 months ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler
158
Voted
IUI
2006
ACM
15 years 9 months ago
Augmenting kitchen appliances with a shared context using knowledge about daily events
Networked appliances can simplify our lives, but interacting with them can be difficult in itself. KitchenSense is an early prototype of a networked kitchen full of sensors that u...
Chia-Hsun Jackie Lee, Leonardo Bonanni, José...
129
Voted
CHI
2010
ACM
15 years 10 months ago
d.note: revising user interfaces through change tracking, annotations, and alternatives
Interaction designers typically revise user interface prototypes by adding unstructured notes to storyboards and screen printouts. How might computational tools increase the effic...
Björn Hartmann, Sean Follmer, Antonio Ricciar...